G. Avoine, L. Buttyan, T. Holczer, and I. Vajda, Group-Based Private Authentication, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007.
DOI : 10.1109/WOWMOM.2007.4351808

G. Avoine, E. Dysli, and P. Oechslin, Reducing Time Complexity in RFID Systems, Selected Areas in Cryptography, 2005.
DOI : 10.1007/11693383_20

H. Bock, M. Braun, M. Dichtl, J. Heyszl, E. Hess et al., A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography, RFIDSec2008 ? Proceedings of the 4th Workshop on RFID Security, 2008.

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, CHES 2007, pp.450-366, 2007.
DOI : 10.1007/978-3-540-74735-2_31

A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw et al., Hash Functions and RFID Tags: Mind the Gap, CHES 2008, pp.283-299, 2008.
DOI : 10.1007/978-3-540-85053-3_18

M. Braun, E. Hess, and B. Meyer, Using Elliptic Curves on RFID Tags, International Journal of Computer Science and Network Security, vol.2, pp.1-9, 2008.

L. Buttyan, T. Holczer, and I. Vajda, Optimal Key-Trees for Tree-Based Private Authentication, Privacy Enhancing Technologies, 2006.
DOI : 10.1007/11957454_19

M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, CHES 2004, pp.357-370, 2004.
DOI : 10.1007/978-3-540-28632-5_26

. Bundesamt-für-sicherheit-in-der-informationstechnik, Advanced Security Mechanisms for Machine Readable Travel Documents: Extended Access Control, Password Authenticated Connection Establishment (PACE), and Restricted Identification (RI), Version 2.02, 2009.

R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Robust Threshold DSS Signatures, Advances in Cryptology ? EUROCRYPT 1996, 1996.

D. Hong, J. Sung, S. Hong, J. Lim, S. Lee et al., HIGHT: A New Block Cipher Suitable for Low-Resource Device, CHES 2006, pp.46-59, 2006.
DOI : 10.1007/11894063_4

S. K. Langford, Threshold DSS Signatures without a Trusted Party, Advances in Cryptology ? CRYPTO 1995, pp.397-409, 1995.
DOI : 10.1007/3-540-44750-4_32

M. Li, R. Poovendran, R. Falk, A. Köpf, K. Sampigethaya et al., Multi-Domain RFID Access Control Using Asymmetric Key Based Tag-Reader Mutual Authentication, ICAS2008 ? Proceedings of the 26th international Congress of the Aeronautical Sciences, 2008.

C. Lim and T. Korkishko, mCryption ? A Lightweight Block Cipher for Security of Low-cost RFID Tags and Sensors, WISA 2005, pp.243-258, 2005.

P. Mackenzie and M. K. Reiter, Two-party generation of DSA signatures, Advances in Cryptology ? CRYPTO 2001, 2001.
DOI : 10.1007/s001450010003

U. Meyer, J. Cordasco, and S. Wetzel, An approach to enhance inter-provider roaming through secret sharing and its application to WLANs, Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots , WMASH '05, pp.1-13, 2005.
DOI : 10.1145/1080730.1080732

D. Molnar and D. Wagner, Privacy and security in library RFID, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, 2004.
DOI : 10.1145/1030083.1030112